On Mar 6, 2009, at 6:09 AM, Dan wrote:
> As for its application here... hacking OS X is > an act of creating a derivative work, done by decoding part of the > copyrighted OS. Not true of the so-called "vanilla" installs, which utilize a "retail" DVD with absolutely NO changes to the MacOS modules themselves. > That there decoding is illegal. Apple believes its encrypted kernel means that ANY decryption of same is a violation. But, Apple's encryption algorithm was disclosed to its developers, and it is a very simple algorithm. Early OSX86 installers DID make use of prior knowledge of Apple's decrypter. These instances are generally identified as "dsmos.kext". "Dsmos" is generally taken to mean "Dont Steal MacOS". However, an "open source" decrypter, one which in NO WAY uses any prior knowledge of Apple's decrypter code has been developed, and this decrypter is now part of many OSX86 installation kits. These instances are generally identified as "AppleDecrypt.kext". This is NOT an Apple module, not withstanding the inclusion of "Apple" in its file name. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed Low End Mac's G3-5 List, a group for those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs. The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette guide is at http://www.lowendmac.com/lists/netiquette.shtml To post to this group, send email to g3-5-list@googlegroups.com To unsubscribe from this group, send email to g3-5-list-unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/g3-5-list?hl=en Low End Mac RSS feed at feed://lowendmac.com/feed.xml -~----------~----~----~----~------~----~------~--~---